Publications

Please refer to my Google Scholar.

Book Chapters:

  • Tehranipoor, F., Karimian, N., Wortman, P., Haque, A., Fahrny, J., and Chandy, J., “Exploring Methods of Authentication for the Internet of Things,” Taylor & Francis, 2018.

Journal Publications:

  • Yue, M. and Tehranipoor, F., 2021. A Novel Probability-Based Logic-Locking Technique: ProbLock. Sensors, 21(23), p.8126.
  • Ghandali, Soroor, Ghandali, Samaneh, and Tehranipoor, F., “Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128”, IEEE Access, 2021.
  • Gordon, H., Lyp, T., Kimbro, C., and Tehranipoor, F., “A Novel IoT Sensor Authentication Using HaLoExtraction Method and Memory Chip Variability”, Discover Internet-of-Things (DIoT), 2021.
  • Gordon, H., Edmonds, J., Ghandali, S., Yan, W., Karimian, N. and Tehranipoor, F., 2021. Flash-based security primitives: evolution, challenges and future directions. Cryptography, 5(1), p.7.
  • Cordeiro, R., Gajaria, D., Limaye, A., Adegbija, T., Karimian N., and Tehranipoor, F., “ECG-based Authentication using Timing-Aware Domain-Specific Architecture”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 39, no. 11, pp. 3373-3384, Nov. 2020, doi: 10.1109/TCAD.2020.3012169.
  • Yue, M., Karimian, N., Yan, W., Anagnostopoulos, N., and Tehranipoor, F., “DRAM-based Authentication using Deep Convolutional Neural Networks”, IEEE Consumer Electronics Magazine, 2020.
  • Wortman, P., Tehranipoor, F., Yan, W., and Chandy, J., ” P2M-Sec: Security Enhancement using PUF and PRNG Combined Model for Consumer Electronic Devices”, IET Computers and Digital Techniques, August 2018.
  • Wortman, P., Tehranipoor, F., Yan, W., and Chandy, J., ” P2M-Sec: Security Enhancement using PUF and PRNG Combined Model for Consumer Electronic Devices”, IET Computers and Digital Techniques, August 2018.
  • Anagnostopoulos, N.A., Katzenbeisser, S., Chandy, J. and Tehranipoor, F., “An Overview of DRAM-Based Security Primitives”, Cryptography MDPI, DoI: 10.3390/cryptography2020007, Vol. 2, ISSN = 2410-387X, 2018.
  • Tehranipoor, F., Wortman, P., Karimian, N., Yan, W., and Chandy, J., “DVFT: A Lightweight Solution for Power Supply Noise based TRNG using a Dynamic Voltage Feedback Tuning System,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems (TVLSI), DOI:10.1109/TVLSI.2018.2804258, pp.1-14, Mar. 2018.
  • Tehranipoor, F., Karimian, N., Yan, W. and Chandy, J.A., “DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems (TVLSI), DOI: 10.1109/TVLSI.2016.2606658, vol. 25, no. 3, pp.1085-1097, Mar. 2017. (Among most popular articles – IEEE)
  • Yan, W., Tehranipoor, F., and Chandy, J.A., “PUF-Based Fuzzy Authentication Without Error Correcting Codes,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), DOI: 10.1109/TCAD.2016.2638445, vol. 36, no. 9, pp. 1445-1457, Dec. 2017.

Conference Proceedings:

  • Tehranipoor, F., Karimian, Nima, and Edmond, J.,  “Breaking AES-128: Machine Learning-Based SCA under Different Scenarios and Devices”, IEEE International Conference on Cyber Security and Resilience (IEEE CSR), 2023.
  • Karimian, N., Tehranipoor, F., and Lyp, T., “Trustworthy of Implantable Medical Devices using ECG Biometric”, Silicon Valley Cybersecurity Conference (SVCC), 2023.
  • Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J. and Tehranipoor, F., 2022, September. Towards AI-Enabled Hardware Security: Challenges and Opportunities. In 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS) (pp. 1-10). IEEE, 2022.
  • Mellor, J., Shelton, A., Yue, M., and Tehranipoor, F., “Investigation of Reinforcement Learning-based Attack on Logic Locking”, IEEE International Symposium on Technologies for Homeland Security (HST), Nov. 2021.
  • Ghandali, Soroor., Ghandali, Samaneh, and Tehranipoor, F., “Profiled Power Analysis Attacks by Efficient Architectural Extension of CNN Implementation”, 22nd International Symposium on Quality Electronic Design (ISQED’21), 2021.
  • Mellor, J., Shelton, A., Yue, M., and Tehranipoor, F., Attacks on Logic Locking Obfuscation Techniques” in 39th IEEE International Conference on Consumer Electronics (ICCE), Jan. 2021.
  • Lyp, T., Karimian, N., and Tehranipoor, F., “LISH: A New Random Number Generator Using ECG Noises”, in 39th IEEE International Conference on Consumer Electronics (ICCE), Jan. 2021.
  • Yan, W., Tehranipoor, F., Zhang, X., and Chandy, J., “FLASH: FPGA Locality-Aware Sensitive Hash for Nearest Neighbor Search and Clustering Application”, IEEE International Conference on Field-Programmable Logic and Applications (FPL), 2020.
  • Yan, W., Zhu, H., Yu, Z., Tehranipoor, F., Chandy, J., Zhang, N., and Zhang, X., “Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory”, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), February 2020.
  • Wortman, P.A., Tehranipoor, F. and Chandy, J.A., 2020, December. Exploring the coverage of existing hardware vulnerabilities in community standards. In Silicon Valley Cybersecurity Conference (pp. 87-97). Springer, Cham.
  • Aguirre, A., Hall, M., Lim, T., Trinh, J., Yan, W., and Tehranipoor, F., “A Systematic Approach for Internal Entropy Boosting in Delay-based RO PUF on an FPGA”, IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), 2020.
  • Tehranipoor, F., and Karimian N., “How to Generate Robust Keys from Noisy DRAMs?”, In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), 2019.
  • Tehranipoor, F., Karimian, N., Mozaffari-Kermani, M., and Mahmoodi, M., “Deep Learning for Securing Logic Locking based Obfuscation”, In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), May 2019.
  • Karimian, N., and Tehranipoor, F., “HeartID-based Authentication for Autonomous Vehicles using Deep Learning and Random Number Generators” SPIE Defense and Commercial Sensing, April 2019.
  • Tehranipoor, F., Karimian, N., and Pugazhenthi, A.*, “DLA-PUF: Deep Learning Attacks on Hardware Security Primitives”, SPIE Defense and Commercial Sensing, April 2019.
  • Anagnostopoulos, N.A., Arul, T., Fan, Y., Sharma, R., Tehranipoor, F., Hatzfeld, C., and Katzenbeisser, S., “Securing IoT Devices Using Robust DRAM PUFs “, Global Information Infrastructure and Networking Symposium (GIIS), August 2018.
  • Anagnostopoulos, N.A., Schaller, Arul, T., Fan, Y., Hatzfeld C., Tehranipoor, F. (20%), and Katzenbeisser, S., “Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions”, 28th Krypto-tag, Kirchheim bei München, Germany, Jun 2018.
  • Wortman, P., Tehranipoor, F., Chandy, J., “An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design,” IEEE International Conference on Cyber Security and Protection of Digital Services, 2018.
  • Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J.,” Low-cost Authentication Paradigm for Consumer Electronics within the Internet of Wearable Fitness Tracking Applications,” IEEE Conference on Consumer Electronics (ICCE), Jan. 2018.
  • Yan, W., Jin, C., Tehranipoor, F., and Chandy, J., “Phase Calibration PUF Design and Implementation on FPGA,” 27th International Conference on Field-Programmable Logic and Applications (FPL), Sep. 2017.
  • Eckert, C., Tehranipoor, F., and Chandy, J., “DRNG: DRAM-based Random Number Generation using its Startup Value Behavior,” 60th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug. 2017.
  • Athanasios, N., Schaller, A., Fan, Y., Xiong, W., Tehranipoor, F., Arul, T., Gabmeyer, S., Szefer, J., Chandy, J., and Katzenbeisser, S., “Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Of-the-Shelf Devices for Security Applications,” 26th Crypto-Day, Jun 2017.
  • Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “DRAM PUFs Reliability Analysis due to Device Accelerated Aging,” IEEE International Symposium on Circuits and Systems (ISCAS), May 2017.
  • Karimian, N., Tehranipoor, F., Guo, Z., Tehranipoor, M., and Forte, D., “Noise Assessment Framework for Optimizing ECG-based Key Generation,” IEEE International Symposium on Technologies for Homeland Security (HST), Apr. 2017.
  • Wortman, P., Tehranipoor, F., Karimian, N., and Chandy, J., ” Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017.
  • Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J., “Investigation of the IoT in its Application to Low-Cost Authentication within Healthcare,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017 (Short paper).
  • Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “A study of Power Supply Variation as a Source of Random Noise,” 30th International Conference on VLSI Design & 16th International Conference on Embedded Systems (VLSID), Jan. 2017. (Best Paper Award)
  • Okwuosah, S., Funes, A., Guo, C., Tehranipoor, F., and Chandy, J., “Multi-Communication Type Debugging Probe,” IEEE MIT Undergraduate Research Technology Conference (MIT-URTC), Nov. 2016.
  • Karimian, N., Wortman, P., and Tehranipoor, F., “Evolving Authentication Design Considerations of the Internet of Biometric Things (IoBT),” Proceedings of the Eleventh IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis (CODES), Oct. 2016.
  • Tehranipoor, F., Yan, W., and Chandy, J., “Robust Hardware True Random Number Generators using DRAM Remanence Effects,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016.
  • Yan, W., Tehranipoor, F., and Chandy, J., “A Novel Way to Authenticate Untrusted Integrated Circuits,” IEEE International Conference on Computer-Aided Design (ICCAD), Nov. 2015.
  • Karimian, N., Tehranipoor, F., Rahman, M. T., Kelly, S., and Forte, D., “Genetic Algorithm for Hardware Trojan Detection with Ring Oscillator Network (RON),” IEEE International Conference on Technologies for Homeland Security (HST), Apr. 2015.
  • Tehranipoor, F., Karimian, N., Xiao, K., and Chandy, J., “DRAM based Intrinsic Physical Unclonable Functions for System Level Security,” In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), May 2015.

Posters:

  • Yue, M., and Tehranipoor, F., “New Locked Circuits for Hardware Security”, Silicon Valley Cybersecurity Conference (SVCC), 2020.
  • Ghandali, S., and Tehranipoor, F., “Deep Learning for Side-Channel Analysis”, Silicon Valley Cybersecurity Conference (SVCC), 2020.
  • Pugazhenthi, A.*, Tehranipoor, F., “How to secure smart Internet of Things (IoT) wearable healthcare devices using authentication techniques?”, under anonymous review, 2019.
  • Pugazhenthi, A.*, Tehranipoor, F., “Machine Learning Attacks on Physical Unclonable Functions”, 9th international GREEN and sustainable computing Conference (IGSC), October 2018.
  • Anagnostopoulos, N.A., Arul, T., Fan Y., Sarangdhar, R., Sharma, R, Rosenstihl, M., Hatzfeld, C., Tehranipoor, F., Katzenbeisser, S., “On the Effects of Environmental Factors on the Functionality of Modern Dynamic Random Access Memory Modules”, 7th International Conference “Micro&Nano 2018” (accepted).
  • Tehranipoor, F., Yan, W., and Chandy, J., “DRAM Remanence Effects based Hardware TRNG”, HOST Conference, May 2016.
  • Tehranipoor, F., and Chandy, J., “Investigation of DRAM Physical Unclonable Function”, CHASE Workshop, March 2015.